Public Date:
917017: CVE-2013-1798 kernel: kvm: out-of-bounds access in ioapic indirect register reads

The MITRE CVE dictionary describes this issue as:

The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.

Find out more about CVE-2013-1798 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue did not affect the versions of Linux kernel as shipped with Red Hat
Enterprise Linux 5 and Red Hat Enterprise MRG as they did not provide support
for the KVM subsystem.

CVSS v2 metrics

Base Score 5.9
Base Metrics AV:A/AC:H/Au:S/C:C/I:N/A:C
Access Vector Adjacent Network
Access Complexity High
Authentication Single
Confidentiality Impact Complete
Integrity Impact None
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
RHEV Hypervisor for RHEL-6 (rhev-hypervisor6) RHSA-2013:0746 2013-04-23
Red Hat Enterprise Linux Extended Update Support 6.2 (kernel) RHSA-2013:1026 2013-07-09
Red Hat Enterprise Linux Virtualization 5 (kvm) RHSA-2013:0727 2013-04-09
Red Hat Enterprise Linux 6 (kernel) RHSA-2013:0744 2013-04-23
Red Hat Enterprise Linux Extended Update Support 6.3 (kernel) RHSA-2013:0928 2013-06-11

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 2 realtime-kernel Not affected
Red Hat Enterprise Linux 5 kernel Not affected
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.


Red Hat would like to thank Andrew Honig of Google for reporting this issue.
Last Modified

CVE description copyright © 2017, The MITRE Corporation